Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research

PA-2000 Series - Next-Generation Firewall

Safely enable applications, users, and content at throughput speeds of up to 1 Gbps using the PA-2050 and the PA-2020. Dedicated computing resources for the functional areas of networking, security, content inspection, and management ensure predictable firewall performance.

 

 

PA-2050

  • 1 Gbps firewall throughput (App-ID enabled1)
  • 500 Mbps threat prevention throughput
  • 300 Mbps IPSec VPN throughput
  • 250,000 max sessions
  • 15,000 new sessions per second
  • 2,000 IPSec VPN tunnels/tunnel interfaces
  • 1,000 SSL VPN Users
  • 10 virtual routers
  • 1/6* virtual systems (base/max2)
  • 40 security zones
  • 5,000 max number of policies

PA-2020

  • 500 Mbps firewall throughput (App-ID enabled1)
  • 200 Mbps threat prevention throughput
  • 200 Mbps IPSec VPN throughput
  • 125,000 max sessions
  • 15,000 new sessions per second
  • 1,000 IPSec VPN tunnels/tunnel interfaces
  • 500 SSL VPN Users
  • 10 virtual routers
  • 1/6* virtual systems (base/max2)
  • 40 security zones
  • 2,500 max number of policies

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved